Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 17 Apr 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wavlink wl-wn530h4
|
|
| Vendors & Products |
Wavlink wl-wn530h4
|
Fri, 17 Apr 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Wavlink WL-WN530H4 20220721. This vulnerability affects the function strcat/snprintf of the file /cgi-bin/internet.cgi. The manipulation results in os command injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 2026.04.16 is able to resolve this issue. Upgrading the affected component is recommended. | |
| Title | Wavlink WL-WN530H4 internet.cgi snprintf os command injection | |
| First Time appeared |
Wavlink
Wavlink wl-wn530h4 Firmware |
|
| Weaknesses | CWE-77 CWE-78 |
|
| CPEs | cpe:2.3:o:wavlink:wl-wn530h4_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wavlink
Wavlink wl-wn530h4 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-17T10:53:26.356Z
Reserved: 2026-04-17T05:35:30.853Z
Link: CVE-2026-6483
Updated: 2026-04-17T10:53:19.906Z
Status : Received
Published: 2026-04-17T11:16:11.160
Modified: 2026-04-17T11:16:11.160
Link: CVE-2026-6483
No data.
OpenCVE Enrichment
Updated: 2026-04-17T11:30:16Z